CVE-2024-10977

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-10977
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10977.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-10977
Aliases
Downstream
Related
Published
2024-11-14T13:15:04Z
Modified
2025-11-20T02:00:47.105577Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results. This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

References

Affected packages

Git / git.postgresql.org/git/postgresql.git

Affected ranges

Type
GIT
Repo
https://git.postgresql.org/git/postgresql.git
Events
Introduced
ad1f2885b8c82e0c2d56d7974f012cbecce17a17
Fixed
20a82026828536331ebe912b86f060078a173633

Affected versions

Other

REL_12_0
REL_12_1
REL_12_10
REL_12_11
REL_12_12
REL_12_13
REL_12_14
REL_12_15
REL_12_16
REL_12_17
REL_12_18
REL_12_19
REL_12_2
REL_12_20
REL_12_3
REL_12_4
REL_12_5
REL_12_6
REL_12_7
REL_12_8
REL_12_9